hardware-and-architecture

Z
Zenodo (CERN European Organization for Nuclear Research)

This paper presents a paradigm-shifting data preservation framework that completely bypasses the von Neumann storage bottleneck and Shannon's information limits. By utilizing a deterministic Resonance Mapping algorithm, physical digital payloads are evaporated into 256-bit mathematical coordinate seeds, reducing physical storage requirements to absolute zero bytes. The protocol guarantees O(1) co…

Computer ScienceHardware and ArchitecturePhysical SciencesPhysical Unclonable Functions (PUFs) and Hardware Security
Z
Zenodo (CERN European Organization for Nuclear Research)

We present LSH-Burn, a Rust-based implementation of the LSH-SFA (Spacetime Field Attention) architecture using the Burn deep learning framework. LSH-Burn provides 1+N pluggable backend support for CUDA, Vulkan, AMD ROCm, WGPU, and ndarray backends. Key components include WavePacketProjector for token-to-wave-packet conversion, FieldAttention with Gaussian similarity, ResonanceCoupling for frequen…

Computer ScienceEmbedded Systems Design TechniquesHardware and ArchitecturePhysical Sciences
T
Transportation Research Part B Methodological
H
HAL (Le Centre pour la Communication Scientifique Directe)
N
Nature Communications

Developing high-security anticounterfeiting with reliable authentication remains a significant challenge in preventing information leakage and economic losses from counterfeiting. Here, we successfully reported physically uncopiable optical system based on piezochromic polymer hydrogels (PPH). Pressure treatment induces a clustering-triggered emission transition from red to blue, driven by suppre…

Computer ScienceHardware and ArchitecturePhysical SciencesPhysical Unclonable Functions (PUFs) and Hardware Security
E
Energy Conversion and Management
L
Lund University Publications (Lund University)

The development and manufacturing process for Integrated Circuits (ICs) has become complex and globally distributed. System integrators use a mix of custom made logic with third-party Intellectual Property (IP) blocks, untrusted software tools, and external actors for manufacturing, post-production test, and validation. The many untrusted actors involved throughout the IC’s lifetime become a secu…

Computer ScienceHardware and ArchitecturePhysical SciencesPhysical Unclonable Functions (PUFs) and Hardware Security
DEV Community

External GPU (eGPU) + NVIDIA Drivers on Linux: Solving the Display Manager Initialization Problem TL;DR: If your NVIDIA eGPU works in recovery mode but gives a black screen on normal boot, you're missing one critical Xorg option: AllowExternalGpus . This guide shows how to fix it properly on any X11-based Linux distribution. Introduction Installing NVIDIA drivers on a Linux system with an externa…

computer-architectureengineering
N
Nature Communications
S
SPIRE - Sciences Po Institutional REpository
Z
Zenodo (CERN European Organization for Nuclear Research)

Modern real-time systems exhibit non-deterministic behavior and state divergence due to latency, asynchronous communication, and event-driven architectures that lack guarantees of consistent execution across distributed devices. Traditional systems rely on event semantics, where discrete instructions are transmitted and interpreted independently by receiving nodes. This introduces a fundamental l…

Computer ScienceHardware and ArchitecturePhysical SciencesReal-Time Systems Scheduling
Z
Zenodo (CERN European Organization for Nuclear Research)

Abstract Programming languages differ significantly in how subprogram calls and runtime stack management are implemented, which reflects underlying variations in execution models, design philosophies, and performance objectives. This study systematically compares subprogram call implementation across four widely used languages: C, Java, Python, and Haskell—examining activation record structures, …

Computer ScienceHardware and ArchitectureParallel Computing and Optimization TechniquesPhysical Sciences
Z
Zenodo (CERN European Organization for Nuclear Research)

Abstract Programming languages differ significantly in how subprogram calls and runtime stack management are implemented, which reflects underlying variations in execution models, design philosophies, and performance objectives. This study systematically compares subprogram call implementation across four widely used languages: C, Java, Python, and Haskell—examining activation record structures, …

Computer ScienceHardware and ArchitectureParallel Computing and Optimization TechniquesPhysical Sciences
Z
Zenodo (CERN European Organization for Nuclear Research)

The perennial belief that one firewall product is enough to safeguard all sections of a modern enterprise is not merely a fallacy that is based on budget constraint. It is an architectural disaster that has quantifiable effects. This paper has brought forward a domain specific model to comprehend why information technology (IT) networks, operational technology (OT) space, as well as internet-faci…

Computer ScienceHardware and ArchitectureNetwork Packet Processing and OptimizationPhysical Sciences
I
International Journal for Research in Applied Science and Engineering Technology

Web applications have become critical components of modern digital infrastructure, making them frequent targetsof cyberattacks such as SQL injection, cross-site scripting, command injection, and directory traversal. Traditional Web Application Firewalls rely primarily on signature-based rule matchingandoftenfailtodetectobfuscatedorpreviouslyunseen attacks. This paper proposes an AI-enhanced Web A…

Computer ScienceHardware and ArchitectureNetwork Packet Processing and OptimizationPhysical Sciences
N
Nature Communications

The rapid advancement of artificial intelligence has raised concerns regarding its trustworthiness, especially in terms of interpretability and robustness. Tree-based models such as Random Forest excel in interpretability and accuracy for tabular data, but scaling them remains computationally expensive due to poor data locality and high data dependence. Previous efforts to accelerate these models…

Computer ScienceHardware and ArchitectureNetwork Packet Processing and OptimizationPhysical Sciences
S
Sensors

The rapid proliferation of the Internet of Things (IoT) leaves terminal devices vulnerable to considerable security challenges, notably the absence of robust yet efficient identity authentication mechanisms. Traditional certificate-based approaches incur substantial management overhead and storage expenditure, whereas Identity-Based Cryptography poses inherent key escrow risks. To tackle these ch…

Computer ScienceHardware and ArchitecturePhysical SciencesPhysical Unclonable Functions (PUFs) and Hardware Security
research.ioresearch.io

Sign up to keep scrolling

Create your feed subscriptions, save articles, keep scrolling.

Already have an account?